{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
Driven by events no one could have foreseen, leaders in recent years have pushed their companies and themselves beyond their comfort zone: out of the office to remote workplaces; into the cloud; along chains of supply that are almost completely digital. And with each new venture has come new cyber risks.
Good news: CISOs and cyber teams have risen to the challenge and other C-suite executives have joined forces with them. More than 70% of 3,522 respondents observed improvements in cybersecurity in the past year — thanks to cumulative investments and C-suite collaboration.
But the goalposts keep moving so there’s more work to do — and in a tough economic environment:
Fewer than 40% of senior executives say they have fully mitigated the risks their bold moves incurred.
By their own assessments, CISOs see the need to advance further on five cyber capabilities: identify, detect, protect, respond, recover.
Senior execs see heightened threats to their organisation and worry they’re not fully prepared to address them.
In 2023, these challenges loom: mandated disclosures, tests of resilience, and pressure to get data security and privacy right.
Cybersecurity has become a more dynamic field, rapidly adjusting and shifting to keep apace with business inventiveness.
This agility is what’s needed for the tougher challenges ahead. How can each of you continue to make a difference? Where should CISOs and cyber teams wield influence for the greatest effect?
The C-suite playbook on cybersecurity and privacy, featuring our latest survey, Global Digital Trust Insights, highlights what lies ahead in 2023 and how executives can work together for cyber-ready futures.
Two-thirds of executives consider cybercrime their most significant threat in the coming year. Cybercriminals, increasingly using off-the-shelf tools, can perpetrate and orchestrate a variety of attacks.
The breach: Attackers exploit a misconfiguration in a company's cloud-hosted internet-facing application and steal user data to sell on the black market.
Consequences: Costly notifications to data owners. A possible class-action lawsuit against the company. Damage to the enterprise's reputation.
What went wrong: Inadequate security, no defence in depth, coding errors, inadequate testing of written and library code, improperly encrypted data.
How to work together for better defence:
The breach: A manufacturing system is impacted by a ransomware event due to exploitable vulnerabilities existing in legacy operating systems.
Consequences: Production stops as affected systems are shut down to prevent damage from spreading. Impacts ripple through the supply chain.
What went wrong: Hackers exploit unpatched vulnerabilities to inject ransomware. The exploited vulnerabilities were previously patched in enterprise systems, however due to a lack of patch management, monitoring and detection capabilities for the legacy systems, the vulnerabilities remained undetected.
How to work together for better defence:
The breach: A medical employee opens a document in a phishing email, activating malware.
Consequences: Service disruption and a near-complete shutdown of networks.
What went wrong: Antivirus software was running out of date rules that failed to detect malware embedded in the malicious attachment. The lack of multi-factor authentication allowed the attackers to obtain initial access. Unnoticed on the corporate network for eight weeks, the cyber criminals conducted reconnaissance of the network and eventually compromised a domain admin account, giving them elevated privileges to launch malware that shut down much of the core IT infrastructure and compromised backups.
How to work together for better defence:
For an example of a post-incident review of a ransomware event, please see Conti cyber attack on the HSE.
Available: C-suite playbook on cybersecurity and privacy
Sign up to get the full playbook to access more of the latest findings and what lies ahead for 2023.
Access the full reportSee you how stack up against your peers — right now
Leverage our cybersecurity and privacy benchmarking tool to gain real-time insights on how your organisation is performing.
Take the surveyThe 2023 Global Digital Trust Insights is a survey of 3,522 business, technology, and security executives (CEOs, corporate directors, CFOs, CISOs, CIOs, and C-Suite officers) conducted in July and August 2022. Female executives make up 31% of the sample.
Fifty-two percent of respondents are executives in large companies ($1 billion and above in revenues); 16% are in companies with $10 billion or more in revenues.
Respondents operate in a range of industries: Industrial manufacturing (24%), Tech, media, telecom (21%), Financial services (20%), Retail and consumer markets (18%), Energy, utilities, and resources (9%), Health (5%), and Government and public services (3%).
Respondents are based in various regions: Western Europe (31%), North America (28%), Asia Pacific (18%), Latin America (12%), Eastern Europe (5%), Africa (4%), and Middle East (3%).
The Global Digital Trust Insights Survey is formerly known as the Global State of Information Security Survey (GSISS).
PwC Research, PwC’s global Centre of Excellence for market research and insight, conducted this survey.
Global Cybersecurity & Privacy Leader, PwC US; Cyber, Risk & Regulatory Leader, PwC US